Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for authenticating a user by means of an application

a user and application technology, applied in the field of methods and systems for authenticating users through applications, can solve the problems of providing no guarantee of authenticity, user may have the difficulty of always carrying different cards and having them replaced,

Active Publication Date: 2013-05-16
INTERDIGITAL CE PATENT HLDG
View PDF13 Cites 28 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

The patent describes a system and method for authenticating a user using an application. This helps verify the user's identity and ensure they have access to the application. The technical effect of this invention is improved security and protection of sensitive information.

Problems solved by technology

Identification is performed through the unsecured UID, which provides no guarantee as to authenticity.
Another problem is that a user may have the difficulty of always carrying different cards and having them replaced in case of loss.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for authenticating a user by means of an application
  • Method and system for authenticating a user by means of an application
  • Method and system for authenticating a user by means of an application

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017]Certain embodiments of the present invention may be found in a method and system for authenticating a user using an application, as described in the following in more detail with reference to the attached figures.

[0018]As utilized herein the terms “circuits” and “circuitry” refer to physical electronic components (i.e. hardware) and any software and / or firmware (“code”) which may configure the hardware, be executed by the hardware, and or otherwise be associated with the hardware. As utilized herein, “and / or” means any one or more of the items in the list joined by “and / or”. As an example, “x and / or y” means any element of the three-element set {(x), (y), (x, y)}. As another example, “x, y, and / or z” means any element of the seven-element set {(x), (y), (z), (x, y), (x, z), (y, z), (x, y, z)}. As utilized herein, the terms “block” and “module” refer to functions than can be performed by one or more circuits. As utilized herein, the term “exemplary” means serving as a non-limit...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A user may be authenticated by an application. The user may be in possession of a user-specific card, which may store a user ID (UID), an operator ID (SID), and a plurality of application IDs (AIDn), and other related data. The card may provide data for implementing a plurality of security steps, performed individually or in combination, as chosen depending on a desired security level and / or the application. In a first security step, the application may read from the card the user ID (UID) from the card. In a second security step, the application may read out the operator ID (SID) and forward it to a server of an operator, which may then verify the operator ID (SID). In a third security step, the application may read out and verify its corresponding application ID (AIDn). The application may request additional information for the user from the server, using the user ID (UID).

Description

CLAIM OF PRIORITY AND CROSS-REFERENCE TO RELATED APPLICATIONS / INCORPORATION BY REFERENCE[0001]Pursuant to 35 U.S.C. §119, this patent application claims the filing date benefit of and right of priority to Swiss Patent Application no. 2011CH-1829, which was filed on Nov. 16, 2011.[0002]The above stated application is hereby incorporated herein by reference in its entirety.FEDERALLY SPONSORED RESEARCH OR DEVELOPMENT[0003][Not Applicable].MICROFICHE / COPYRIGHT REFERENCE[0004][Not Applicable].FIELD OF THE INVENTION[0005]The invention relates to a method and a system for authenticating a user by an application.BACKGROUND OF THE INVENTION[0006]RFID (Radio-Frequency Identification) devices (e.g., badges, tags, and cards) are known in the state of the art, and can be used to authenticate a user vis-à-vis different services, and the user can subsequently avail himself or herself of these services. In order to guarantee the security of these cards, a sophisticated security concept is required....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(United States)
IPC IPC(8): G06K5/00G06K19/07
CPCG06K5/00G06F2221/2115G06F21/35G06K19/0723G07C9/27G07C9/22
Inventor STRAUMANN, HUGO
Owner INTERDIGITAL CE PATENT HLDG
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products